The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The volume of information generated online makes it impossible to manually fact-check all claims. Computational approaches for fact checking may be the key to help mitigate the risks of massive misinformation spread. Such approaches can be designed to not only be scalable and effective at assessing veracity of dubious claims, but also to boost a human fact checker's productivity by surfacing relevant...
We are on the verge of a major shift in the way we perceive digital life, what may cause a significant impact to the real world. Gradually, through increasing knowledge in the areas of artificial intelligence, big data and machine learning, computers have been emulating deceased human beings and, symbolically, with the aid of technology, have been managing to conquer death. This article seeks to understand...
The SCM model of 3-echelon is used to optimize the expenditure by minimizing the inventory use that can generally increase the additional expenditure in the system. This paper develops an SCM model of 3-echelon multi-tiers that is comprised suppliers s, producers p, and retails r. The model was developed using deterioration rate assumption of raw material and finished product following Weibull distribution...
The problem of the discovery and marketing of new drugs can be vastly accelerated through High Performance Computing (HPC), molecular modeling techniques, and more specifically by means of the techniques commonly named as computational drug discovery (CDD) and in silico high throughput screening. These techniques usually assume a unique interaction site (active site) between potential drugs and a...
A numerical prediction algorithm called addition-subtraction frequency (ASF) algorithm is presented in this paper to predict potential valley-point dates of stock market. In the paper, we use historical valley-point date data of Shanghai Security Exchange (SSE) Composite Index as the input of ASF algorithm. According to the Royal Swedish Academy of Sciences, the stock prediction in the next three...
Industrial systems are more and more dominated by software. In addition, this software is present across several compute domains, from decentralized edge to centralized datacenters and clouds. While the productivity of application lifecycle management has tremendously improved in the area of cloud computing, there is no homogeneous and seamless environment to build, deploy and operate the software...
A developer of mobile or desktop applications is responsible for implementing the network logic of his software. Nonetheless: i) Developers are not network specialists, while pressure for emphasis on the visible application parts places the network logic out of the coding focus. Moreover, computer networks undergo evolution at paces that developers may not follow. ii) From the network resource provider...
Enterprise-level 2.0 applications (E2.0) built on cloud computing Web 2.0 infrastructure offer promising new business models. However, recent studies show that most E2.0 firms experience a low free-to-paid conversion rate. Based on accumulated archival data and literature on predictive models and data mining, in this paper, we develop a logit model to predict the likelihood of E2.0 user continuance...
Email is a reliable, confidential, fast, free and easily accessible form of communication. Due to its wide use in personal, but most importantly, professional contexts, email represents a valuable source of information that can be harvested for understanding, reengineering and repurposing undocumented business processes of companies and institutions. Few researchers have investigated the problem of...
Detecting difference between process models is important for many business process management scenarios, such as process version control and process merging. However, it is far from trivial to detect the process difference. Existing work suffers from drawbacks like inappropriate data structure support or expensive computation. In this paper, we propose FB-Diff, a feature-based difference detection...
We propose a method for automatic modeling of electronic devices using a prefix-suffix approach. We implement it into a user-friendly computer program and give preliminary results supporting the validity of our approach. Patterns of prefixes and suffixes are obtained. We find two patterns giving 100% correct detection of supply current in 10 regulators' datasheets from Texas Instrument Inc.
The Brazilian power system is a hydrothermal system mainly composed of hydroelectric generation. In order to deal with the uncertainties related to future water inflows a hydroelectric power plant receives an assured energy certificate. In general, those assured energy certificates correspond to energy that each plant can produce considering a 5% risk of energy not supplied. Also, they represent the...
A federated cloud environment is composed of interconnected clouds that share resources using an interface, transparent to users. In such environments, ensuring security is a complex task, since individual characteristics of each federated cloud has to be considered. This is one important issue, which can prevent companies and organizations from adopting federated clouds. In this context, this paper...
Persistent and zero-day attacks have increased considerably in the recent past in terms of scale and impact. Security experts can no longer rely only on known defenses and thereby protect their resources permanently. It is increasingly common now to observe attackers being able to repeatedly break systems exploiting new vulnerabilities and defenders hardening systems with new measures. To model this...
Semantic extraction based on key words is essential method to find relationships of entities. Enterprise relations analysis is becoming more and more popular in financial field, because it gives explanation on business processes and decision-making reference on investments. Most of previous studies focused on the analysis of specific situations and built relations on targeted enterprises. Hence, there...
The growing complexity of products and processes in industrial production require new methods of processing technical information and searching for new IT solutions. Fast and adequate solutions can be made on the basis of extensive information and long-term experience. This is possible when the implementation of automated systems is seen as a general-functional process in which the emphasis is placed...
Studying the thermal field of household appliances for food preparation is an important element of their design. Determining heat losses is directly related to the assessment of their effectiveness. For this purpose, mathematical models were developed based on the finite element method. Their adequacy was assessed by experimental studies. The data obtained enable the simulation of different operational...
This article represents the setting of a generalized task on the assignment based on the classic assignment task (or selection task), inefficiency of the solutions search of the generalized task on assignments with the help of the classical assignment task algorithms. A PC algorithm has been developed and implemented for calculation of the “block indicator” allowing one to find the number of solutions...
The paper analyzes the existing methods and approaches to correcting bases of fuzzy rules of decision support systems (DSS). There was developed and implemented a two-stage method of fuzzy rule base correction for hierarchically-organized DSS with discrete logic output at variable structure of input vector. The appropriate method interactively provides reduction of database rules structure and correction...
The paper examines the features of IT-projects and their impact on the management decisions of outsourcing companies in their implementation, as well as demonstrates the necessity to apply simulation models of portfolio management of IT-projects. It introduces a system-dynamic model of IT-project with elements of the cognitive approach as a basis for model management of an outsourcing IT-company as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.